{"affected":[{"ecosystem_specific":{"binaries":[{"kgraft-patch-3_12_36-38-default":"5-2.1","kgraft-patch-3_12_36-38-xen":"5-2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12","name":"kgraft-patch-SLE12_Update_2","purl":"pkg:rpm/suse/kgraft-patch-SLE12_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5-2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis kernel live patch for Linux Kernel 3.12.36-38.1 fixes security issues and bugs:\n\nSecurity issues fixed:\n- CVE-2015-8539: A negatively instantiated user key could have been used\n  by a local user to leverage privileges (bnc#958601).\n\n- CVE-2015-6937: A NULL pointer dereference flaw was found in the Reliable\n  Datagram Sockets (RDS) implementation allowing a local user to cause\n  system DoS. A verification was missing that the underlying transport\n  exists when a connection was created. (bsc#953052)\n\n- CVE-2015-7990: RDS: Verify the underlying transport exists before\n  creating a connection, preventing possible DoS (bsc#953052).\n\n- CVE-2015-7872: Possible crash when trying to garbage collect an\n  uninstantiated keyring (bsc#951542).\n\n- CVE-2015-2925: The prepend_path function in fs/dcache.c in the Linux\n  kernel did not properly handle rename actions inside a bind mount, which\n  allowed local users to bypass an intended container protection mechanism\n  by renaming a directory, related to a 'double-chroot attack (bnc#951625).\n\nNon-security bugfix were also done:\n- xfs: Fix lost direct IO write in the last block (bsc#954005).\n- simple fix in kallsyms initialization (bsc#940342 bsc#916225)\n  ","id":"SUSE-SU-2016:0384-1","modified":"2016-02-08T13:46:19Z","published":"2016-02-08T13:46:19Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160384-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/916225"},{"type":"REPORT","url":"https://bugzilla.suse.com/940342"},{"type":"REPORT","url":"https://bugzilla.suse.com/951542"},{"type":"REPORT","url":"https://bugzilla.suse.com/951625"},{"type":"REPORT","url":"https://bugzilla.suse.com/953052"},{"type":"REPORT","url":"https://bugzilla.suse.com/954005"},{"type":"REPORT","url":"https://bugzilla.suse.com/958601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-2925"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-6937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-7872"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-7990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-8539"}],"related":["CVE-2015-2925","CVE-2015-6937","CVE-2015-7872","CVE-2015-7990","CVE-2015-8539"],"summary":"Security update for kernel live patch 2","upstream":["CVE-2015-2925","CVE-2015-6937","CVE-2015-7872","CVE-2015-7990","CVE-2015-8539"]}